Free CompTIA CySA+ CS0-003 Practice Question

During the investigation of a security incident, an analyst has narrowed down the potential causes to a shortlist of vulnerabilities. Which of the following actions is most effective in determining the actual exploited vulnerability that led to the compromise?

  • Verifying patch levels and update histories for the affected systems.

  • Reviewing public CVE databases for matches with the shortlisted vulnerabilities.

  • Examining the less secure network paths to find the most plausible point of entry.

  • Analyzing the correlation between exploit signatures and network traffic.

This question's topic:
CompTIA CySA+ CS0-003 / 
Reporting and Communication
Your Score:

Check or uncheck an objective to set which questions you will receive.